Because access controls limit access to information and information processing systems. When implemented effectively, they mitigate the risk of information being accessed without the appropriate authorisation, unlawfully and the risk of a data breach.
Most large organizations use role-based access control to provide their employees with varying levels of access based on their roles and responsibilities.
like the canvas web application there is role for the student and other for TA and instructor.
The role determines which permissions the system grants to the user.
An organization may let some individuals create or modify files while providing others with viewing permission only.
Access control systems can be physical, limiting access to buildings, rooms, or servers, or they can be logical, controlling digital access to data, files, or networks.
It’s a security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features.
allows the user to access the various resources based on the user’s identity
Role Based Access Control :
Role-based access control (RBAC) restricts network access based on a person’s role within an organization and has become one of the main methods for advanced access control.
Capabilities :
A capability is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights.
events based on two things :
EventEmitter : it is a module from node.js that allows us to use event driven programming, by built in events and functions.